Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 18:19
Behavioral task
behavioral1
Sample
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe
Resource
win10v2004-20240412-en
General
-
Target
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe
-
Size
1.7MB
-
MD5
05d1c90ec78b45292ea6cbc0e0d2a5ec
-
SHA1
e5ad67b0a0265b6f02b3869131f6bc2ef17eb279
-
SHA256
875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba
-
SHA512
d0a3f7d6d69e12f43d2adf0244750e728f20d546ecff92fc674b5f6ddc468f4353e2b77c91459b739556a034e0cfaa3d7c4024170d0c3108076a88d2c377038f
-
SSDEEP
24576:VZyU70mm2QoyUaQQwi2Apubm/fEAD08cYcFpz7gT/To83oGuUNZ1JzSAmFOGYXF:OQ0LQqwxbo8CcYcFpUTb3oGuaJzRPGY
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/4252-123-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4108-139-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-185-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1764-186-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4252-187-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4108-188-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-190-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-201-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-211-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-215-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-219-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-223-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-228-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-232-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-236-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-240-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-244-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/736-248-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/736-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0009000000023363-5.dat UPX behavioral2/memory/4252-123-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4108-139-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-185-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1764-186-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4252-187-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4108-188-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-190-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-201-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-211-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-215-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-219-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-223-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-228-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-232-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-236-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-240-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-244-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/736-248-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/736-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0009000000023363-5.dat upx behavioral2/memory/4252-123-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4108-139-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-185-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1764-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4252-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4108-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-223-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-240-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-244-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/736-248-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\S: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\Z: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\R: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\A: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\B: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\K: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\L: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\M: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\N: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\Q: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\T: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\V: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\X: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\Y: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\I: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\O: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\P: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\W: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\E: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\H: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\J: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File opened (read-only) \??\U: 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\malaysia trambling uncut fishy .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\japanese fetish hardcore masturbation cock 50+ (Sylvia).rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\config\systemprofile\danish handjob lingerie several models girly (Anniston,Curtney).mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\System32\DriverStore\Temp\gay voyeur .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\hardcore catfight upskirt .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\config\systemprofile\italian cumshot lingerie hidden cock (Kathrin,Liz).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\FxsTmp\bukkake hidden bondage .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese kicking horse [bangbus] titts YEâPSè& .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\FxsTmp\canadian lingerie full movie (Karin).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\IME\SHARED\gay [free] stockings .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\gay girls .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish gang bang lesbian voyeur cock balls .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Templates\italian handjob trambling hot (!) hole (Christine,Jade).rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\horse big .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\japanese cumshot gay [bangbus] latex (Britney,Curtney).mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\russian nude blowjob full movie (Jade).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\italian handjob lingerie sleeping hotel .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Common Files\microsoft shared\russian nude blowjob voyeur cock pregnant .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\brasilian cum beast girls hole .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\swedish cum trambling big .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\chinese lesbian hot (!) feet shoes .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\russian action lesbian [bangbus] feet shower .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\dotnet\shared\fucking girls titts .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\danish porn trambling sleeping hotel .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Google\Temp\swedish animal lingerie hot (!) glans beautyfull (Samantha).rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Google\Update\Download\italian gang bang fucking several models .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\italian gang bang lesbian [milf] titts mistress .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files\Microsoft Office\Updates\Download\danish nude sperm [milf] .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\brasilian animal lingerie hot (!) shoes .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Program Files (x86)\Microsoft\Temp\tyrkish gang bang horse several models glans upskirt .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\brasilian fetish trambling [milf] girly .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\spanish trambling sleeping upskirt (Jenna,Melissa).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\Downloaded Program Files\horse full movie titts mistress .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\japanese porn trambling public (Janette).avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\trambling big upskirt .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\brasilian horse sperm [milf] .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\japanese nude blowjob uncut hole latex .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\american kicking lingerie [bangbus] feet stockings .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\horse sleeping (Karin).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\swedish cum fucking lesbian boots (Britney,Melissa).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\assembly\tmp\xxx [free] glans .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\kicking lesbian [free] wifey .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_es-es_64c107d8bb3ade94\american cum lingerie masturbation .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\lesbian big (Liz).mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\danish fetish hardcore girls titts swallow .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\asian fucking girls (Janette).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\beast [milf] glans redhair (Jade).mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\horse gay [milf] hole .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\xxx hidden ejaculation .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\african gay masturbation traffic .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\british blowjob uncut upskirt .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\horse fucking hidden hole .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\assembly\temp\sperm voyeur .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\cum sperm sleeping cock .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\blowjob big girly .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\xxx voyeur stockings .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\fetish fucking catfight pregnant .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\italian cumshot lingerie masturbation feet femdom .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\norwegian beast girls shoes .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\brasilian nude bukkake [milf] shoes .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\CbsTemp\swedish kicking gay [bangbus] .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\InputMethod\SHARED\russian action bukkake [bangbus] cock sm .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\fucking [bangbus] feet .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\chinese xxx licking cock .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\american kicking xxx girls hole bedroom (Janette).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\german blowjob licking .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\asian beast uncut pregnant .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\cumshot fucking hot (!) .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\brasilian nude lingerie lesbian .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\cum bukkake [milf] .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\gang bang horse lesbian traffic .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\malaysia beast sleeping latex .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\french hardcore girls bondage (Sonja,Tatjana).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\animal xxx licking (Jade).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\tyrkish fetish horse big leather .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\spanish bukkake [bangbus] circumcision .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\russian porn lingerie sleeping titts .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\malaysia lesbian lesbian .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\PLA\Templates\black cumshot gay [milf] glans (Sonja,Sylvia).mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\black animal horse voyeur granny (Gina,Curtney).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\danish fetish hardcore [bangbus] .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\beast [bangbus] .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\porn fucking sleeping .rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\animal blowjob girls glans .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\mssrv.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\sperm voyeur cock sm .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\canadian bukkake sleeping feet bedroom .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\italian handjob gay girls .mpeg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\italian cum trambling big hole mistress (Melissa).zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\malaysia hardcore [bangbus] high heels .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\indian porn bukkake lesbian pregnant .zip.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\xxx catfight cock mistress (Curtney).rar.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\porn sperm voyeur .mpg.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\swedish cumshot xxx public .avi.exe 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4108 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 4252 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 736 wrote to memory of 1764 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 89 PID 736 wrote to memory of 1764 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 89 PID 736 wrote to memory of 1764 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 89 PID 736 wrote to memory of 4252 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 93 PID 736 wrote to memory of 4252 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 93 PID 736 wrote to memory of 4252 736 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 93 PID 1764 wrote to memory of 4108 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 95 PID 1764 wrote to memory of 4108 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 95 PID 1764 wrote to memory of 4108 1764 875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"C:\Users\Admin\AppData\Local\Temp\875d81f6650b62206df4c6383937dfb64d70d0b8d11f7bffc2b9bfdc7bde36ba.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\horse big .mpg.exe
Filesize349KB
MD5dc116ac7df30e04093166151a440888a
SHA161db77be1d3846a57e0333a5388c8b8a8ea22682
SHA25671db62a5b462990b11db59a42ebc40624ba176765bf75dfe3a1ef2b231a1d946
SHA51265d71080d35da268fed2e19f0277b13306553775778304cfc43b1b67d9bc766d89496f916474274484091de16d872c7cd4ea01b80127fe5135d831e194da2e43